Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
59a524c2928595e3e7c8e45ba5f8877d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59a524c2928595e3e7c8e45ba5f8877d.exe
Resource
win10v2004-20231215-en
General
-
Target
59a524c2928595e3e7c8e45ba5f8877d.exe
-
Size
304KB
-
MD5
59a524c2928595e3e7c8e45ba5f8877d
-
SHA1
f6750abb1d9b68d8244f9a6bad6754f0cf55a029
-
SHA256
77e6fa761983370d075f8cbdaa22280449e732490b7b6841d116edf6037aeec6
-
SHA512
0efbfc7ef1c873c3b733a5defd9ca5e9695cf2d5ef8cfae7270704268a36c4d781c9f5d37c4ea3c27dbe80525ab915bf8344390e3b84a23cfec71fb997aebb16
-
SSDEEP
6144:C/0uoLcNe1F6DizTa9uZMlIKGs7LTqy3etzsvDH/xe:CJix1k2q9uZMcsmyxDHZe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2412 10054_~1.EXE -
Loads dropped DLL 5 IoCs
pid Process 2356 59a524c2928595e3e7c8e45ba5f8877d.exe 2412 10054_~1.EXE 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 59a524c2928595e3e7c8e45ba5f8877d.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2888 2412 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2412 2356 59a524c2928595e3e7c8e45ba5f8877d.exe 28 PID 2356 wrote to memory of 2412 2356 59a524c2928595e3e7c8e45ba5f8877d.exe 28 PID 2356 wrote to memory of 2412 2356 59a524c2928595e3e7c8e45ba5f8877d.exe 28 PID 2356 wrote to memory of 2412 2356 59a524c2928595e3e7c8e45ba5f8877d.exe 28 PID 2356 wrote to memory of 2412 2356 59a524c2928595e3e7c8e45ba5f8877d.exe 28 PID 2356 wrote to memory of 2412 2356 59a524c2928595e3e7c8e45ba5f8877d.exe 28 PID 2356 wrote to memory of 2412 2356 59a524c2928595e3e7c8e45ba5f8877d.exe 28 PID 2412 wrote to memory of 2888 2412 10054_~1.EXE 29 PID 2412 wrote to memory of 2888 2412 10054_~1.EXE 29 PID 2412 wrote to memory of 2888 2412 10054_~1.EXE 29 PID 2412 wrote to memory of 2888 2412 10054_~1.EXE 29 PID 2412 wrote to memory of 2888 2412 10054_~1.EXE 29 PID 2412 wrote to memory of 2888 2412 10054_~1.EXE 29 PID 2412 wrote to memory of 2888 2412 10054_~1.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\59a524c2928595e3e7c8e45ba5f8877d.exe"C:\Users\Admin\AppData\Local\Temp\59a524c2928595e3e7c8e45ba5f8877d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10054_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10054_~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD525fc448ee4f93e6f98458fd631e30c6e
SHA14512de71991eda40509dae5afcc6a80fea9ab631
SHA256b88e4865cc23836275ce6efc2c9f1b2c42ea0c8f34ad90913cdca7f4b48a678f
SHA512654f880fa4f21d22cae423299886ac1cb0d8b380e60dfe1b28a787a838919448411c4a713296aeca11e17e5cc114518ec448f7a3047f6f8f17b8740a5292d9b8